S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text]

Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime. Continue reading S3 Ep114: Preventing cyberthreats – stop them before they stop you! [Audio + Text]

Reduce the Harm of a Data Breach With Data Security Analytics

Over the last year, the average total cost of a data breach increased nearly 10% to $4.24 million. That’s the highest average in the history of IBM Security’s annual Cost of a Data Breach Report. This was due to a number of factors. Increased remote working due to the COVID-19 pandemic and digital transformation both […]

The post Reduce the Harm of a Data Breach With Data Security Analytics appeared first on Security Intelligence.

Continue reading Reduce the Harm of a Data Breach With Data Security Analytics

The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

In our journey through the Open Systems Interconnection (OSI) seven layers of networking, the OSI session layer is a gatekeeper that manages the connection between applications. In other words, we are past just connecting devices. Now, we need to do something with that connection, which at this stage is called a session. This part of […]

The post The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer appeared first on Security Intelligence.

Continue reading The OSI Model and You Part 5: Stopping Threats at the OSI Session Layer

Moving Threat Identification From Reactive to Predictive and Preventative

In a previous post, we focused on organizations’ characteristics, such as sector, geography, risk and impact, when discussing the pillars of building a threat identification program. Now, we move deeper into the concept and expand upon the threat identification process through example scenarios, helping translate the conceptual framework into daily practice. It’s Always About Business […]

The post Moving Threat Identification From Reactive to Predictive and Preventative appeared first on Security Intelligence.

Continue reading Moving Threat Identification From Reactive to Predictive and Preventative

Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

With the rise of the remote workforce, CISOs need to shift focus from corporate networks to protect against insider threats and risks beyond the traditional perimeter. Here’s what to consider.

The post Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network appeared first on Security Intelligence.

Continue reading Recalibrate Insider Threat Controls When Your Employees Are Off the Corporate Network

4 Principles That Should Define Your Evolving Security Operations Model

It’s never too soon to set the stage for your next-generation security operations model. Here are four important considerations to keep in mind.

The post 4 Principles That Should Define Your Evolving Security Operations Model appeared first on Security Intelligence.

Continue reading 4 Principles That Should Define Your Evolving Security Operations Model

How a More Connected Approach Can Help With Threat Management

Using capabilities that maximize and connect existing security solutions and data sources can help organizations advance their threat management initiatives in multiple ways.

The post How a More Connected Approach Can Help With Threat Management appeared first on Security Intelligence.

Continue reading How a More Connected Approach Can Help With Threat Management

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful.

The post State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends appeared first on Security Intelligence.

Continue reading State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends

A Guide to Easy and Effective Threat Modeling

Threat modeling is a process by which potential threats can be identified, enumerated and prioritized, all from a hypothetical attacker’s point of view. Learn more about building a threat model.

The post A Guide to Easy and Effective Threat Modeling appeared first on Security Intelligence.

Continue reading A Guide to Easy and Effective Threat Modeling

Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?

What kinds of state and local government institutions are being targeted by cybercriminals? And what can we learn from recent municipal cyberattacks?

The post Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks? appeared first on Security Intelligence.

Continue reading Municipal Cyberattacks Put Us All at Risk: What Can We Learn From Previous Attacks?